SELF-DESTRUCTION PROCEDURE FOR CLUSTER-TREE WIRELESS SENSOR NETWORKS

Madalin Plastoi, Daniel Curiac, Ovidiu Banias, Constantin Volosencu, Dan Pescaru, Alex Doboli

2009

Abstract

Wireless sensor networks (WSN) are rapidly expanding their attractiveness in both military and civilian applications, imposing the need for effective security strategies/mechanisms. In this paper we considered that a new phase (self-destruction) must be included as a final stage in the WSN lifecycle in order to assure the confidentiality regarding information like: network topology, type of measurement data gathered by sensors, encryption/authentication algorithms and key-exchange mechanisms, etc. that can be unveiled through reverse engineering methods. Moreover, we presented a new procedure that implements this new lifecycle phase on a cluster-tree network topology.

References

  1. C. Karlof, D. Wagner, 2003. Secure routing in wireless sensor networks: attacks and countermeasures. Proc. of the First IEEE International Workshop on Sensor Network Protocols and Application, pp.113- 127.
  2. D. Curiac, O. Banias, F. Dragan, C.Volosencu, O. Dranga, 2007. Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique. ICNS, 3rd International Conference on Networking and Services, Athens, pp 83-88.
  3. M. Dohler, 2008. Wireless sensor networks: the biggest cross-community design exercise to-date. Bentham Recent Patents on Computer Science, pp.9- 25.
  4. J. Steffan, L. Fiege, M. Cilia, A.Buchmann, 2005. Towards Multi-Purpose Wireless Sensor Networks. Proceedings of Systems Communications, pp 336-341.
  5. S. C. Ergen, 2004. ZigBee/IEEE 802.15.4 Summary. http://www.eecs.berkeley.edu/csinem/academic/public ations/zigbee.pdf, pp 1-35.
  6. A. Koubaa, M. Alves,, M. Attia, A. Van Nieuwenhuyse, 2006. Collision-Free Beacon Scheduling Mechanisms for IEEE 802.15.4/Zigbee Cluster-Tree Wireless Sensor Networks. Technical Report, Version 1.0, http://www.open-zb.net/, pp 1-16.
  7. K. Sohrabi, J. Gao, V. Ailawadhi and G. J. Pottie, 2000. Protocols for Self-Organization of a Wireless Sensor Network. IEEE Pers. Comm. Mag., v.7, no.5, pp16-27.
  8. Y. C. Wong, J. T. Wang, N. H. Chang, H. H. Liu, C. C. Tseng, JUNE 2008. Hybrid Address Configuration for Tree-based Wireless Sensor Networks. IEEE Communications Letters, VOL. 12, NO. 6, pp 414-416.
Download


Paper Citation


in Harvard Style

Plastoi M., Curiac D., Banias O., Volosencu C., Pescaru D. and Doboli A. (2009). SELF-DESTRUCTION PROCEDURE FOR CLUSTER-TREE WIRELESS SENSOR NETWORKS . In Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2009) ISBN 978-989-674-008-5, pages 63-67. DOI: 10.5220/0002229200630067


in Bibtex Style

@conference{winsys09,
author={Madalin Plastoi and Daniel Curiac and Ovidiu Banias and Constantin Volosencu and Dan Pescaru and Alex Doboli},
title={SELF-DESTRUCTION PROCEDURE FOR CLUSTER-TREE WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2009)},
year={2009},
pages={63-67},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002229200630067},
isbn={978-989-674-008-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Wireless Information Networks and Systems - Volume 1: WINSYS, (ICETE 2009)
TI - SELF-DESTRUCTION PROCEDURE FOR CLUSTER-TREE WIRELESS SENSOR NETWORKS
SN - 978-989-674-008-5
AU - Plastoi M.
AU - Curiac D.
AU - Banias O.
AU - Volosencu C.
AU - Pescaru D.
AU - Doboli A.
PY - 2009
SP - 63
EP - 67
DO - 10.5220/0002229200630067